International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 9 | Number 2 | Year 2014 | Article Id. IJCTT-V9P153 | DOI : https://doi.org/10.14445/22312803/IJCTT-V9P153

Risk Assessment in Online Banking System


K.V.D. Kiran , P.Sruthi , P.S. Neema , G.V.S. Manju Vani , Rishikesh Sahu

Citation :

K.V.D. Kiran , P.Sruthi , P.S. Neema , G.V.S. Manju Vani , Rishikesh Sahu, "Risk Assessment in Online Banking System," International Journal of Computer Trends and Technology (IJCTT), vol. 9, no. 2, pp. 279-285, 2014. Crossref, https://doi.org/10.14445/22312803/ IJCTT-V9P153

Abstract

With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information system, it is a key point to have risk assessment. This paper deals with the risk assessment in information security of distributed banking sector. The process of identification and analysis of various assets (both hardware and software), vulnerabilities, threats and risks in distributed banking sector has assumed utmost importance. This paper also presents collective information regarding various risk assessment methodologies like qualitative, quantitative and hybrid methods and tools such as OCTAVE and IRAM that are being employed in order to perform risk assessment in information security.

Keywords

assets, authentication, concurrency, distributed computing, quantitative and qualitative methodologies, risk assessment, security, threat, vulnerabilities.

References

[1] http://www.cs.ucl.ac.uk/staff/ucacwxe/lectures/ds98-99/dsee3.pdf
[2] http://www.csc.villanova.edu/~schragge/CSC8530/Intro. html
[3] http://www.icoe.org/webfm_send/1936
[4] http://secunia.com/advisories/21499
[5] http://securitytracker.com/alerts/2006/Aug/1016698. html
[6] http://www.frsirt.com/english/advisories/2006/3291
[7] http://www.securityfocus.com/bid/19535
[8] http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00746980
[9] http://marc.theaimsgroup.com/?l=bugtraq&m=11080510520047&w=2
[10] http://xforce.iss.net/xforce/xfdb/19276
[11] http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
[12] http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
[13] http://secunia.com/advisories/55537
[14] http://www.sybase.com/detail?id=1099371
[15] http://osvdb.org/95311
[16] http://www.securityfocus.com/bid/61247
[17] http://xforce.iss.net/xforce/xfdb/85698
[18] http://www.securityfocus.com/bid/53134
[19] http://rhn.redhat.com/errata/RHSA-2013-1779. html
[20] http://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html
[21] http://rhn.redhat.com/errata/RHSA-2013-1752.html
[22] http://rhn.redhat.com/errata/RHSA-2013-1753.html
[23] http://www.cvedetails.com/product/16924/IBM-Z-os.html?vendor_id=14
[24] http://www.cvedetails.com/vulnerability-ist/vendor_id-14/product_id-17/cvssscoremin-6/cvssscoremax-6.99/IBM-AIX.html